Menu

Cyber Attacks Through Impersonation

Overview

This course describes how cyber attacks through impersonation are conducted. It also provides practical advice and recommended security controls to implement, reducing the likelihood and impact of an impersonation cyber attack. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.

Prerequisites

None

Objectives

After attending this presentation you will be able to...

  • Identify what a cyber impersonation attack is
  • Recognize how impersonation attacks are conducted
  • Distinguish security controls & protocols that can help prevent or minimize the impact of impersonation attacks

Highlights

The major topics that will be covered in this class include:

  • Impersonation techniques used to launch cyber attacks
  • Cybercriminals' focus: stealing financial assets and intellectual property
  • Practical advice on controls to implement to reduce victimization from impersonation cyber attacks
  • Practical advice to reduce the impact of a cyber attack

Register Now

Materials are generally available 3 days in advance of an event. Once you have downloaded the manual, we are unable to cancel your registration.

Event Code:

WX48302

1 CPE Credits
Information technology: 1 Credits

Registration

Member Price:
$55
Non-member Price:
$75

Registration is open through 11/22.

Friday, November 22nd

9:00am to 10:00am

Add to Calendar

Instructor

Petrina Youhan